3166 Search Results

Intel® Ultimate Coder Challenge for IoT: What is Team Vaidya* Up to Now?

Find out what progress Grand Prize Winner Team Vaidya* has made with their winning solution.

Cyberhack Steals $31 Million in Assets

Hackers stole 2 billion rubles, about $31 million in U.S. dollars, from the Russian Central Bank last week.  They fell short of their targeted goal of about 5 billion rubles ($78 million dollars), but still enough for a good haul.  Such big heists...

Floki Bot is Becoming an International Sensation with Cybercriminals

Floki Bot, a new financial oriented malware, is popular with English, Portuguese, and Russian speaking underground criminal markets, winning over cybercriminals with new features and functionality.  It is currently being used by a number of...

How to Reduce Your Data Center Footprint

Learn about innovative ways to address the rapidly increasing growth of Video streaming demands while reducing your data center footprint and costs.

December Top Ten

Top Ten Intel® Software Developer Stories | December

A little Shakespeare, more from CERN and some fun from SC16 in this month's Top Ten.

Why Intel® CoFluent™ Technology for Big Data

Intel CoFluent Studio is a product from Intel that lets you build models of pretty much any system to evaluate performance and behavior using an abstract model instead of concrete code.

The Fab Five: Game Dev Content | December

Arizona Sunshine*, a dog named Waffles, and the Escape Room*. Read all about it in this month's best of Game Dev Blog.

The Best of Modern Code | December

Read the best Modern Code articles and blogs for the month of December.

VTune Amplifier - Collection failed due to SCP failing to copy files from the host to the target

VTune Amplifier uses SCP as a mechanism to copy files to and from the host and the target system, while performing a remote collection.  Often, you may encounter an issue where VTune Amplifier will stop with the "Collection failed" error with a sub...

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 3

This is the third post in a series of blogs about how to configure and deploy a bare metal controller using Ironic.

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 2

This is the second post in a series of blogs about how to configure and deploy a bare metal controller using Ironic

How to Configure and Deploy a Bare Metal Controller using OpenStack Ironic - Part 1

OpenStack is a virtualization environment supported by several operating systems. Over the years, Linux* distributions have become easier to install and configure, however, despite these improvements, installing an OS on a server is still time consuming. This series of blogs shows the steps to...

Intel GameDev at VRDC 2016

Last updated: December 6, 2016

As a Diamond Sponsor of the Virtual Reality Developer’s Conference, Intel showcased a number of new VR technologies live in San Francisco.  Featured VR Games included Arizona Sunshine and The Unspoken, see below for more. The Intel GameDev program...

Metal Minds

Intel hosted AI Day last month. Read about the latest in AI, Machine Learning and Deep Learning including new student and educational programs.

Smart Hospitals Need to be Secured

I want my hospital to be smart, but I demand it be secure and safe!  A new report from the European Union Agency for Network and Information Security (ENISA) outlines strong recommendations for hospitals to protect themselves from cyber risks as...

How to Plot OpenMP* Scaling Results

Short Version When plotting scaling graphs for Intel processors which support multiple hardware threads/core, NEVER use an X-axis labelled “Threads”, but always use “Cores”, and plot separate data for 1thread/core, 2threads/core and, on Intel® Xeon...

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet...

Presence, Reality, and the Art of Astonishment in Arizona Sunshine

What is presence, why does it matter to VR, and how did Intel and Vertigo Games improve it in Arizona Sunshine?

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Where Cybercriminals Will Go Knowing what cybercriminals are targeting today is easy.  Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop.  The tougher challenge is figuring out where...

Interview with Well Told Entertainment about their Virtual Reality Escape Room Game

You light a few candles, turn off the lights, and say Bloody Mary’s name 3 times in to the mirror… can you get past your terror and solve a series of puzzles to escape the room before Mary can get through? Just in time for Halloween, Well Told...

Farewell SHA-1 Hash Algorithm

Rest-in-Peace SHA-1.  Like all security controls, they are only valuable for a certain period of time. SHA-1, a legacy hashing algorithm once used heavily in secure web browsing, has outlived its usefulness, therefore it is time to be...

What is the Intel® Software Innovator Program? A Quick Look

Intel® Software Innovator Program Did you know that Intel® offers a program specifically designed to support independent developers in using the latest technology and open source software to bring their ideas to life? Intel created this program in...

SVG Images are a New Ransomware Threat

Creative cyber criminals are taking advantage of Facebook's compatibility with SVG images to infect victims with ransomware. SVG (Scalable Vector Graphics) files are dangerous on social media sites, in email, and even instant messaging tools, as...

November IoT

Trending on IoT: Our Most Popular Intel® IoT Developer Stories for November

Read about IoT security issues, create a color match game, and learn more about the Intel® Joule™ Compute Module.

How Simics found a Xen Bug – Why Target Variation Matters

A few months ago, Intel® simulation engineers working on Wind River* Simics* reported a bug in the Xen* hypervisor to the public email list. The bug was that Xen did not do the right thing when enabling Intel® Memory Protection Extensions (Intel®...

Code Modernization: Powering Scientific Discovery and Fostering Innovation Globally at CERN (Part 2)

An Interview with Maria Girone, CTO, CERN openlab  Intel recently talked to CERN openlab CTO Maria Girone to discuss how CERN and Intel work together to deliver improvements in processing speed, sometimes by factors, and how that impacts CERN’s...

"Upstreaming" Artificial Intelligence: Making AI Available for All

Artificial intelligence (AI) - machines that can learn from their results to improve their programming for better results. This is how humans operate. We try something, we judge the result and modify our behavior. What some considered to be science...

Intel Invites Everyone to Game

Last updated: November 16, 2016

IndieCade kicked off this year’s festival for the first time on USC School of Cinematic Arts and Intel jumped at the chance to join in with the Gaming for Everyone Pavilion.

Maximizing performance in the cloud

Getting an instant boost on common web apps hosted in the cloud

Modern Code November

The Best of Modern Code | November

Learn about best practices for vector programming, scaling your application, and how Intel and CERN are moving Modern Code ahead.